Paper
19 March 2009 Research on an immune authentication sub-system for networked storage
Author Affiliations +
Proceedings Volume 7125, Eighth International Symposium on Optical Storage and 2008 International Workshop on Information Data Storage; 71251L (2009) https://doi.org/10.1117/12.821623
Event: Eighth International Symposium on Optical Storage and 2008 International Workshop on Information Data Storage, 2008, Wuhan, China
Abstract
The paper proposed a novel authentication method for networked storage using artificial immune technique, addressing the storage security issue. Most authentication sub-systems adopt the positive identification to judge the user identity, however if an intruder obtains some account information, he may crack the authentication sub-system using Rule-based Attack and do harm to the storage system. Aiming at this problem, we designed a negative authentication to improve entrance security of storage system, where the identification data are stored in Non-self space so as to prevent the intruder from discovering any account information. Additionally, the negative authentication sub-system can filter out the unauthorized users. The experimental results showed that the proposed authentication method could be efficient in detecting unauthorized user, so the negative authentication sub-system may improve the storage security.
© (2009) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jianzhong Huang, Huaiyang Li, and Xin Li "Research on an immune authentication sub-system for networked storage", Proc. SPIE 7125, Eighth International Symposium on Optical Storage and 2008 International Workshop on Information Data Storage, 71251L (19 March 2009); https://doi.org/10.1117/12.821623
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Sensors

Data storage

Computer security

Detection and tracking algorithms

Databases

Target detection

Information security

Back to Top